An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Search
Search
Upload Date
Upload Date
Document Date
Title
Solving xa=b(mod c) for x and Undecimating Recursions.PDF
Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2-4 August 1964.PDF
SIGINT Goes to War.PDF
SIGINT and the Holocaust.PDF
Seward's Other Folly: America's First Encrypted Cable.PDF
Sub-HF Search and Acquisition.PDF
RISC Does Windows.PDF
Revisiting the Dispute over the Identification of "AF" as Midway.PDF
Remembering the Lessons of the Vietnam War.PDF
Regierungs-Oberinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire.PDF
Red and Purple: A Story Retold.PDF
Receiver Dynamics.PDF
Reading Between the Lines: Methods of Analysis of Soviet Military Literature.PDF
The Origination and Evolution of Radio Traffic Analysis: World War II.PDF
Radio Intelligence in Japanese and American North Pacific Naval and Air Operations.PDF
Processor Interconnection Networks from Cayley Graphs.PDF
Problem Encountered with the Variant Record Construct in Ada.PDF
What Every Cryptologist Should Know About Pearl Harbor.PDF
PCSE: A Design Implementation for PC Security.PDF
Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos.PDF
FIRST
79
80
81
(current)
82
83
LAST